Discover PerformanceHP Software's community for IT leaders // July 2013
Defense in 5 stages: Understanding the kill chain
If you’re putting all your efforts into keeping bad guys out, you’ve only covered stage one.Killer security
An X-ray of the SEA
HP Security Research assesses the Syrian Electronic Army and how to protect your enterprise against such adversaries.Cutting-edge foes
Rate your IT against the best
The HP leader who surveyed 650 companies tells us what CIOs can learn from the best in the field.Stand tall
Threat to your share price
Jay Huff and other HP security execs discuss the impact to brand and the reputational damage of a breach—especially with the legal obligation to declare any breach.Watch now
Most read articles
Diving into disruptive technology trends like cloud, mobile, and Big Data, HP’s CEO talks about moving not just IT, but the whole enterprise, into a new era.
Dig into strategic trends with our new Discover Performance Weekly video series, and go backstage at events like RSA.
The percentage of IT organizations that expect all critical apps and operations will be sourced via the cloud by 2016. (Three percent say that’s the case now. An additional 27% expect to get there by 2020.)1
Year by which public cloud infrastructure will be required by the United States to comply with critical national infrastructure regulations. 2
Percentage of overall IT security enterprise product capabilities that will be delivered in the cloud by 2015.2
2“Predicts 2013: Security Solutions,” Gartner Inc., January 2013
Q: How do we prepare for an all-but-inevitable security breach?
A: The smart CISO starts with assessing the state of the business. … “What are we protecting?” The key is to get your business leaders, the people who run and understand the business itself, to answer that question. ... Coca-Cola has the secret formula … Everyone has something they need to protect. Keep in mind that you have to limit the answer to critical things. There is absolutely no feasible way to defend everything in the organization.
—Rafal Los, Principal, HP Enterprise Security Services, on his Wh1t3 Rabbit blog